ContentPosts from @krisztians..
Link
@faun shared a link, 8 months ago

Official Lean AI Native Companies Leaderboard

This leaderboard tracks lean AI Native companies with over $5MM ARR, under 50 employees, and under 5 years old, aiming to measure progress towards the vision of a "1-person" billion dollar startup... read more  

Link
@faun shared a link, 8 months ago

Introducing Gemma 3: The Developer Guide

Gemma 3dazzles with its knack formultimodality, accepting both text and vision-language inputs and accommodating context windows up to 128k tokens. With multilingual prowess spanning 140 languages, it showcases exceptionalmath, reasoning, and chat capabilities. Available in four flavors: 1B, 4B, 12B.. read more  

Introducing Gemma 3: The Developer Guide
Link
@faun shared a link, 8 months ago

AI coding assistant refuses to write code, tells user to learn programming instead

A developer working withCursor AIhit a hurdle when the virtual assistant balked at crafting more than800 lines of code. The assistant, notorious for supporting the art ofvibe coding, urged on manual logic crafting, underscoring its educational leanings. Founded onLLMs, Cursor AI doles out code compl.. read more  

AI coding assistant refuses to write code, tells user to learn programming instead
Link
@faun shared a link, 8 months ago

Here’s how I use LLMs to help me write code

LLMs shine as brisk and remarkably self-assured pair programming sidekicks that untangle intricate coding challenges.While these models can foresee token sequences in code, vigilant human supervision remains necessary for both precision and thorough testing. Their proficiency can ebb when up against.. read more  

Here’s how I use LLMs to help me write code
Link
@faun shared a link, 8 months ago

Finding leaked passwords with AI: How we built Copilot secret scanning

In October 2024, GitHub announced the general availability of Copilot secret scanning, leveraging AI to detect generic passwords in users’ codebases. The approach used combines offline evaluation, testing, and model iteration to improve accuracy and decrease false positives. With a focus on precisio.. read more  

Finding leaked passwords with AI: How we built Copilot secret scanning
Link
@faun shared a link, 8 months ago

Scaling Database Connections

Databases limit the number of connections to save resources like memory and reduce performance impact on the system. Connection pooling helps by reusing connections and addressing the limitations of scaling. Efficient state management is essential for connection multiplexing, allowing multiple clien.. read more  

Link
@faun shared a link, 8 months ago

ClickHouse acquires HyperDX: The future of open-source observability

ClickHousehas scooped upHyperDX, infusing open-source observability with a spruced-up UI and session replay. With its storage wizardry,ClickHousecuts costs by a whopping tenfold, revolutionizing metrics and debugging.HyperDXstays loyal toOpenTelemetryand boasts a robust tie-in withGrafana, expanding.. read more  

ClickHouse acquires HyperDX: The future of open-source observability
Link
@faun shared a link, 8 months ago

Why I'm No Longer Talking to Architects About Microservices

The microservices debate swims in murky waters,plagued by the absence of a unifying definition. Dialogues frequently drift into the abstract, overlookingtangible business goals.Embracing microservices without reshaping the organization dooms efforts, adding technical knots without untangling ineffic.. read more  

Why I'm No Longer Talking to Architects About Microservices
Link
@faun shared a link, 8 months ago

Looking Ahead to WASIp3

WASIp3boosts concurrency with anasynchronous function ABI and support for generic types, letting multiple tasks run in parallel within WebAssembly apps. The component model makes handling asynchronous operations straightforward, which promotes effortless cross-language code reuse... read more  

Looking Ahead to WASIp3
Link
@faun shared a link, 8 months ago

GitHub targeted in supply chain attack

The'tj-actions/changed-files'GitHub Action recently suffered a supply chain breach, baring sensitive secrets from CI/CD logs. Crafty attackers crept in using a GitHub personal access token tied to a bot account, enabling them to smuggle out data. Their cunning involved embedding harmful code to extr.. read more  

GitHub targeted in supply chain attack